Skip to content

Commit f92a7c7

Browse files
authored
Merge pull request #2605 from MicrosoftDocs/main
Published main to live, Thursday 10:30 AM PST, 01/30
2 parents 957685f + 127f021 commit f92a7c7

File tree

5 files changed

+17
-17
lines changed

5 files changed

+17
-17
lines changed

CloudAppSecurityDocs/discovery-docker-ubuntu-azure.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ If you require more than 10 data sources, we recommend that you split the data s
4646
To work with a network appliance that isn't listed, select **Other > Customer log format** or **Other (manual only)**. For more information, see [Working with the custom log parser](custom-log-parser.md).
4747

4848
>[!NOTE]
49-
>Integrating with secure transfer protocols (FTPS and Syslog – TLS) often requires additional settings or your firewall/proxy.
49+
>Integrating with secure transfer protocols (FTPS and Syslog – TLS) often requires additional settings on your firewall/proxy. For more information, see [Advanced log collector management](log-collector-advanced-management.md).
5050
5151
Repeat this process for each firewall and proxy whose logs can be used to detect traffic on your network.
5252

CloudAppSecurityDocs/index.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -48,6 +48,8 @@ landingContent:
4848
links:
4949
- text: Basic setup
5050
url: general-setup.md
51+
- text: Connect cloud apps
52+
url: enable-instant-visibility-protection-and-governance-actions-for-your-apps.md
5153
- text: View and manage security posture
5254
url: security-saas.md
5355
- linkListType: concept
@@ -70,8 +72,6 @@ landingContent:
7072
links:
7173
- text: Calculate risk scores
7274
url: risk-score.md
73-
- text: Connect cloud apps
74-
url: enable-instant-visibility-protection-and-governance-actions-for-your-apps.md
7575
- text: Collect logs
7676
url: discovery-docker.md
7777
- text: Discover and manage shadow IT
@@ -137,4 +137,4 @@ landingContent:
137137
- text: Monitor and respond to unusual data usage
138138
url: app-governance-monitor-apps-unusual-data-usage.md
139139
- text: Secure apps with app hygiene
140-
url: app-governance-secure-apps-app-hygiene-features.md
140+
url: app-governance-secure-apps-app-hygiene-features.md

CloudAppSecurityDocs/log-collector-advanced-management.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -50,9 +50,9 @@ You should be able to view the following contents:
5050
- `ssl_update`
5151
- `config.json`
5252

53-
### Customize certificate files
53+
### Add certificate files
5454

55-
This procedure describes how to customize the certificate files used for secure connections to the cloud discovery Docker instance.
55+
This procedure describes how to add the required certificate files used for secure connections to the cloud discovery Docker instance.
5656

5757
1. Open an FTP client and connect to the log collector host.
5858

@@ -63,7 +63,7 @@ This procedure describes how to customize the certificate files used for secure
6363
| **FTP** |- **pure-ftpd.pem**: Includes the key and certificate data |
6464
| **Syslog** |- **ca.pem**: The certificate authority's certificate that was used to sign the client’s certificate. <br>- **server-key.pem** and **server-cert.pem**: The log collector's certificate and key <br><br>Syslog messages are sent over TLS to the log collector, which requires mutual TLS authentication, including authenticating both the client and server certificates. |
6565

66-
Filenames are mandatory. If any of the files are missing, the update fails.
66+
Files are mandatory. If any of the files for the receiver type are missing, the update fails.
6767

6868
1. In a terminal window, run:
6969

@@ -161,7 +161,7 @@ docker cp Proxy-CA.crt Ubuntu-LogCollector:/var/adallom/ftp/discovery
161161
162162
To secure the docker image and ensure that only one IP address is allowed to send the syslog messages to the log collector, create an IP table rule on the host machine to allow input traffic and drop the traffic coming over specific ports, such as TCP/601 or UDP/514, depending on the deployment.
163163
164-
The following command shows an example of how to create an IP table rule that can be added to the host machine. This table rule allows the IP address `1.2.3.4`` to connect to the log collector container over TCP port 601, and drop all other connections coming from other IP addresses over the same port.
164+
The following command shows an example of how to create an IP table rule that can be added to the host machine. This table rule allows the IP address `1.2.3.4` to connect to the log collector container over TCP port 601, and drop all other connections coming from other IP addresses over the same port.
165165
166166
```bash
167167
iptables -I DOCKER-USER \! --src 1.2.3.4 -m tcp -p tcp --dport 601 -j DROP
@@ -171,7 +171,7 @@ iptables -I DOCKER-USER \! --src 1.2.3.4 -m tcp -p tcp --dport 601 -j DROP
171171
172172
The container is now ready.
173173
174-
Run the **collector_config** command using the API token that you used during the creation of your log collector. For example:
174+
Run the `collector_config` command using the API token that you used during the creation of your log collector. For example:
175175
176176
:::image type="content" source="media/log-collector-advanced-tasks/docker-3.png" alt-text="Screenshot of the Create log collector dialog." border="false":::
177177
@@ -520,7 +520,7 @@ Compare the output file (`/tmp/log.log`) to the messages stored in the `/var/ada
520520
When updating your log collector:
521521
522522
- **Before installing the new version**, make sure to stop your log collector and remove the current image.
523-
- **After installing the new version**, [update your certificate files](#customize-certificate-files).
523+
- **After installing the new version**, [update your certificate files](#add-certificate-files).
524524
525525
## Next steps
526526

defender-endpoint/linux-support-offline-security-intelligence-update.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- mde-linux
1616
ms.topic: conceptual
1717
search.appverid: met150
18-
ms.date: 12/16/2024
18+
ms.date: 01/30/2025
1919
---
2020

2121
# Configure offline security intelligence update for Microsoft Defender for Endpoint on Linux
@@ -187,7 +187,7 @@ Use the following sample `mdatp_managed.json` and update the parameters as per t
187187
},
188188
"antivirusEngine": {
189189
"offlineDefinitionUpdateUrl": "http://172.22.199.67:8000/linux/production/",
190-
"offlineDefintionUpdateFallbackToCloud":false,
190+
"offlineDefinitionUpdateFallbackToCloud":false,
191191
"offlineDefinitionUpdate": "enabled"
192192
},
193193
"features": {

defender-xdr/advanced-hunting-cloudappevents-table.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -39,13 +39,13 @@ For information on other tables in the advanced hunting schema, [see the advance
3939
| `ActionType` | `string` | Type of activity that triggered the event |
4040
| `Application` | `string` | Application that performed the recorded action |
4141
| `ApplicationId` | `int` | Unique identifier for the application |
42-
| `AppInstanceId` | `int` | Unique identifier for the instance of an application. To convert this to Microsoft Defender for Cloud Apps App-connector-ID, use `CloudAppEvents| distinct ApplicationId,AppInstanceId,binary_or(binary_shift_left(AppInstanceId,20),ApplicationId|order by ApplicationId,AppInstanceId` |
42+
| `AppInstanceId` | `int` | Unique identifier for the instance of an application. To convert this to Microsoft Defender for Cloud Apps App-connector-ID, use `CloudAppEvents| distinct ApplicationId,AppInstanceId,binary_or(binary_shift_left(AppInstanceId,20),Application|order by ApplicationId,AppInstanceId` |
4343
| `AccountObjectId` | `string` | Unique identifier for the account in Microsoft Entra ID |
4444
| `AccountId` | `string` | An identifier for the account as found by Microsoft Defender for Cloud Apps. Could be Microsoft Entra ID, user principal name, or other identifiers. |
4545
| `AccountDisplayName` | `string` | Name displayed in the address book entry for the account user. This is usually a combination of the given name, middle initial, and surname of the user. |
4646
| `IsAdminOperation` | `bool` | Indicates whether the activity was performed by an administrator |
4747
| `DeviceType` | `string` | Type of device based on purpose and functionality, such as network device, workstation, server, mobile, gaming console, or printer |
48-
| `OSPlatform` | `string` | Platform of the operating system running on the device. This column indicates specific operating systems, including variations within the same family, such as Windows 11, Windows 10 and Windows 7. |
48+
| `OSPlatform` | `string` | Platform of the operating system running on the device. This column indicates specific operating systems, including variations within the same family, such as Windows 11, Windows 10, and Windows 7. |
4949
| `IPAddress` | `string` | IP address assigned to the device during communication |
5050
| `IsAnonymousProxy` | `boolean` | Indicates whether the IP address belongs to a known anonymous proxy |
5151
| `CountryCode` | `string` | Two-letter code indicating the country where the client IP address is geolocated |
@@ -67,10 +67,10 @@ For information on other tables in the advanced hunting schema, [see the advance
6767
| `RawEventData` | `dynamic` | Raw event information from the source application or service in JSON format |
6868
| `AdditionalFields` | `dynamic` | Additional information about the entity or event |
6969
| `LastSeenForUser` | `dynamic`|Indicates the number of days since a specific attribute was last seen for the user. A value of 0 means the attribute was seen today, a negative value indicates the attribute is being seen for the first time, and a positive value represents the number of days since the attribute was last seen. For example: `{"ActionType":"0","OSPlatform":"4","ISP":"-1"}`|
70-
| `UncommonForUser` | `dynamic`|Lists the attributes in the event that are considered uncommon for the user. Using this data can help rule out false positives and find anomalies. For example: `["ActivityType","ActionType"]`|
71-
| `AuditSource` | `string` |Audit data source. Possible values are one of the following: <br>- Defender for Cloud Apps access control <br>- Defender for Cloud Apps session control <br>- Defender for Cloud Apps app connector |
70+
| `UncommonForUser` | `dynamic`|Lists the attributes in the event that are uncommon for the user, helping to rule out false positives and find anomalies. For example: `["ActivityType","ActionType"].` To filter out nonanomalous results: events with low or insignificant security value won't go through enrichment processes and will have a value of "", while high-value events will go through enrichment processes and, if no anomalies are found, will have a value of "[]".|
71+
| `AuditSource` | `string` |Audit data source. Possible values are one of the following: <br>- Defender for Cloud Apps access control <br>- Defender for Cloud Apps session control <br> - Defender for Cloud Apps app connector |
7272
| `SessionData` |`dynamic` |The Defender for Cloud Apps session ID for access or session control. For example: `{InLineSessionId:"232342"}` |
73-
|`OAuthAppId`|`string`|A unique identifier that is assigned to an application when it is registered to Microsoft Entra with OAuth 2.0 protocol.|
73+
|`OAuthAppId`|`string`|A unique identifier that is assigned to an application when it's registered to Microsoft Entra with OAuth 2.0 protocol.|
7474

7575
## Apps and services covered
7676

0 commit comments

Comments
 (0)